Getting Consensus on Business Requirements: Tips and Traps - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Tips for Accelerating Consensus Building-4 Next

Tips for Accelerating Consensus Building

Stakeholders will participate in a process in which there is a clear beginning, clear momentum during the process, and a valuable product at the end. If the requirements definition process starts to wander, stakeholders lose interest, and then it is extremely difficult to rebuild their motivation and energize the project.

IAG Consulting suggests that a company use activity-based methods for managing the process — this way, large projects are broken into clear, discrete and logical components. With these activities identified, a business use case combines with data or object modeling and definition techniques to produce a more complete decomposition of the process and data requirements. Enacting objective standards enables tests on the completeness of the requirements so that quality can be assessed. Having a clear decomposition and elicitation approach enables participants to more easily keep track of progress toward completion, and understand precisely the degree of completeness expected.

Out of every 100 IT projects started, 94 will start over again at least once. Before your company launches its next package selection, implementation, or upgrade, make sure you don’t cripple the project from the start by failing to identify your requirements the number one reason that projects spin out of control. Make sure that your company has a clear understanding of how important the requirements definition stage is, has a proven way to carry it out properly, and doesn’t skip this critical phase in the rush to get an RFP out the door.

The toughest job in the requirements definition stage is to get stakeholder agreement as a systematic, expected deliverable in the project cycle. It is absolutely essential (even on the most agile of projects) for a team to have consensus on the requirements. IAG Consulting shares what they’ve learned after over 1,000 engagements.

More Slideshows:

Metrics and Measurements: 10 'Silver Bullet' Best Practices Transform your metrics programs and create a positive impact on IT services delivery.

Negligent Employees Top Cause of Data Breaches — Malicious Attacks Most Costly Study reveals negligent insiders are the top cause of data breaches while malicious attacks are 25 percent more costly than other types.

Five Tips for Creating a World-Class Employment Reference List Make the most of your professional references.


Related Topics : Alcatel-Lucent

More Slideshows

IT_Man64-290x195 5 Tips for Working with a Consultancy Firm

Selecting the perfect consultancy firm may seem daunting, but keeping these five tips in mind will help organizations get off to a good start. ...  More >>

Top Six Priority Skills for IT Asset Management Leaders

ITAM is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and legal skills. ...  More >>

Social, Mobile, Cloud and Information: The Building Blocks of Tomorrow’s Technology Platform

A nexus of converging forces is building upon and transforming user behavior while creating new business opportunities. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.